From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 90 ca 55
90ca550960ff4cdcaec6cc4fb5cc92d5df43421b 90ca5540f658d68040a7141c07422b43d80231b0 90ca55bea41e6da989b541a2ce90113cd3ccac9a 90ca55f208aaef7ad60836d9d12fe194fb39b1bc